Skip to content

Commit 2a09565

Browse files
authored
Merge pull request #109002 from MicrosoftDocs/master
3/25 AM Publish
2 parents 940e16f + e3310f7 commit 2a09565

File tree

58 files changed

+494
-369
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+494
-369
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -800,6 +800,11 @@
800800
"redirect_url": "/azure/machine-learning",
801801
"redirect_document_id": false
802802
},
803+
{
804+
"source_path": "articles/notebooks/use-machine-learning-services-jupyter-notebooks.md",
805+
"redirect_url": "/azure/machine-learning/samples-notebooks",
806+
"redirect_document_id": false
807+
},
803808
{
804809
"source_path": "articles/cognitive-services/QnAMaker/Tutorials/create-publish-query-in-portal.md",
805810
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base",
@@ -31855,11 +31860,6 @@
3185531860
"redirect_url": "/azure/security/fundamentals/abstract-serverless-platform-security",
3185631861
"redirect_document_id": true
3185731862
},
31858-
{
31859-
"source_path": "articles/security/azure-ad-choose-authn.md",
31860-
"redirect_url": "/azure/security/fundamentals/choose-ad-authn",
31861-
"redirect_document_id": true
31862-
},
3186331863
{
3186431864
"source_path": "articles/active-directory/authentication/howto-authentication-passwordless-enable.md",
3186531865
"redirect_url": "/azure/active-directory/authentication/concept-authentication-passwordless",
@@ -50358,6 +50358,11 @@
5035850358
{
5035950359
"source_path": "articles/cognitive-services/speech-service/quickstart-voice-assistant-java-jre.md",
5036050360
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-java&tabs=jre"
50361+
},
50362+
{
50363+
"source_path": "articles/security/fundamentals/choose-ad-authn.md",
50364+
"redirect_url": "/azure/active-directory/hybrid/choose-ad-authn",
50365+
"redirect_document_id": true
5036150366
},
5036250367
{
5036350368
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@
2424
href: cloud-governed-management-for-on-premises.md
2525
- name: Four steps to a strong identity foundation
2626
href: four-steps.md
27+
- name: Choose a hybrid identity authentication method
28+
href: choose-ad-authn.md
2729
- name: Azure AD Connect and Connect Health
2830
items:
2931
- name: What is Azure AD Connect and Connect Health?
File renamed without changes.

articles/active-directory/hybrid/how-to-connect-sync-feature-preferreddatalocation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Azure AD Connect supports synchronization of the **preferredDataLocation** attri
6464
By default, **preferredDataLocation** is not enabled for synchronization. This feature is intended for larger organizations. The Active Directory schema in Windows Server 2019 has an attribute **msDS-preferredDataLocation** you should use for this purpose. If you have not updated the Active Directory schema and cannot do so, then you must identify an attribute to hold the Office 365 geo for your users. This is going to be different for each organization.
6565

6666
> [!IMPORTANT]
67-
> Azure AD allows the **preferredDataLocation** attribute on **cloud User objects** to be directly configured by using Azure AD PowerShell. Azure AD no longer allows the **preferredDataLocation** attribute on **synchronized User objects** to be directly configured by using Azure AD PowerShell. To configure this attribute on **synchronized User objects**, you must use Azure AD Connect.
67+
> Azure AD allows the **preferredDataLocation** attribute on **cloud User objects** to be directly configured by using Azure AD PowerShell. To configure this attribute on **synchronized User objects**, you must use Azure AD Connect.
6868
6969
Before enabling synchronization:
7070

articles/aks/azure-ad-v2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ When the status shows as registered, refresh the registration of the `Microsoft.
7474
az provider register --namespace Microsoft.ContainerService
7575
```
7676

77-
## Create an AKS cluster with Azure AD v1.0 enabled
77+
## Create an AKS cluster with Azure AD v2.0 enabled
7878

7979
You can now create an AKS cluster by using the following CLI commands.
8080

@@ -117,7 +117,7 @@ A successful creation of an Azure AD v2 cluster has the following section in the
117117

118118
The cluster is created within a few minutes.
119119

120-
## Accessing an Azure AD v1.0 enabled cluster
120+
## Accessing an Azure AD v2.0 enabled cluster
121121
To get the admin credentials to access the cluster:
122122

123123
```azurecli-interactive
@@ -140,7 +140,7 @@ To get the user credentials to access the cluster:
140140
kubectl get nodes
141141
```
142142

143-
To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code BYMK7UXVD to authenticate. You receive an error:
143+
Follow the instructions to sign in.
144144

145145
**error: You must be logged in to the server (Unauthorized)**
146146

articles/application-gateway/application-gateway-ssl-policy-overview.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: SSL policy overview for Azure Application Gateway
3-
description: Learn how to configure SSL policy for Azure Application Gateway and reduce encryption and decryption overhead from a back-end server farm.
2+
title: TLS policy overview for Azure Application Gateway
3+
description: Learn how to configure TLS policy for Azure Application Gateway and reduce encryption and decryption overhead from a back-end server farm.
44
services: application gateway
55
author: amsriva
66
ms.service: application-gateway
@@ -9,15 +9,15 @@ ms.date: 11/16/2019
99
ms.author: amsriva
1010
---
1111

12-
# Application Gateway SSL policy overview
12+
# Application Gateway TLS policy overview
1313

14-
You can use Azure Application Gateway to centralize SSL certificate management and reduce encryption and decryption overhead from a back-end server farm. This centralized SSL handling also lets you specify a central SSL policy that's suited to your organizational security requirements. This helps you meet compliance requirements as well as security guidelines and recommended practices.
14+
You can use Azure Application Gateway to centralize TLS/SSL certificate management and reduce encryption and decryption overhead from a back-end server farm. This centralized TLS handling also lets you specify a central TLS policy that's suited to your organizational security requirements. This helps you meet compliance requirements as well as security guidelines and recommended practices.
1515

16-
The SSL policy includes control of the SSL protocol version as well as the cipher suites and the order in which ciphers are used during an SSL handshake. Application Gateway offers two mechanisms for controlling SSL policy. You can use either a predefined policy or a custom policy.
16+
The TLS policy includes control of the TLS protocol version as well as the cipher suites and the order in which ciphers are used during a TLS handshake. Application Gateway offers two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy.
1717

18-
## Predefined SSL policy
18+
## Predefined TLS policy
1919

20-
Application Gateway has three predefined security policies. You can configure your gateway with any of these policies to get the appropriate level of security. The policy names are annotated by the year and month in which they were configured. Each policy offers different SSL protocol versions and cipher suites. We recommend that you use the newest SSL policies to ensure the best SSL security.
20+
Application Gateway has three predefined security policies. You can configure your gateway with any of these policies to get the appropriate level of security. The policy names are annotated by the year and month in which they were configured. Each policy offers different TLS protocol versions and cipher suites. We recommend that you use the newest TLS policies to ensure the best TLS security.
2121

2222
### AppGwSslPolicy20150501
2323

@@ -46,19 +46,19 @@ Application Gateway has three predefined security policies. You can configure yo
4646
|Default| False |
4747
|CipherSuites |TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 <br> TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 <br> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA <br>TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA <br>TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256<br>TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384<br>TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384<br>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256<br>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA<br>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA<br>TLS_RSA_WITH_AES_256_GCM_SHA384<br>TLS_RSA_WITH_AES_128_GCM_SHA256<br>TLS_RSA_WITH_AES_256_CBC_SHA256<br>TLS_RSA_WITH_AES_128_CBC_SHA256<br>TLS_RSA_WITH_AES_256_CBC_SHA<br>TLS_RSA_WITH_AES_128_CBC_SHA<br> |
4848

49-
## Custom SSL policy
49+
## Custom TLS policy
5050

51-
If a predefined SSL policy needs to be configured for your requirements, you must define your own custom SSL policy. With a custom SSL policy, you have complete control over the minimum SSL protocol version to support, as well as the supported cipher suites and their priority order.
51+
If a predefined TLS policy needs to be configured for your requirements, you must define your own custom TLS policy. With a custom TLS policy, you have complete control over the minimum TLS protocol version to support, as well as the supported cipher suites and their priority order.
5252

53-
### SSL protocol versions
53+
### TLS/SSL protocol versions
5454

5555
* SSL 2.0 and 3.0 are disabled by default for all application gateways. These protocol versions are not configurable.
56-
* A custom SSL policy gives you the option to select any one of the following three protocols as the minimum SSL protocol version for your gateway: TLSv1_0, TLSv1_1, and TLSv1_2.
57-
* If no SSL policy is defined, all three protocols (TLSv1_0, TLSv1_1, and TLSv1_2) are enabled.
56+
* A custom TLS policy gives you the option to select any one of the following three protocols as the minimum TLS protocol version for your gateway: TLSv1_0, TLSv1_1, and TLSv1_2.
57+
* If no TLS policy is defined, all three protocols (TLSv1_0, TLSv1_1, and TLSv1_2) are enabled.
5858

5959
### Cipher suites
6060

61-
Application Gateway supports the following cipher suites from which you can choose your custom policy. The ordering of the cipher suites determines the priority order during SSL negotiation.
61+
Application Gateway supports the following cipher suites from which you can choose your custom policy. The ordering of the cipher suites determines the priority order during TLS negotiation.
6262

6363

6464
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
@@ -91,7 +91,7 @@ Application Gateway supports the following cipher suites from which you can choo
9191
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
9292

9393
> [!NOTE]
94-
> SSL cipher suites used for the connection are also based on the type of the certificate being used. In client to application gateway connections, the cipher suites used are based on the type of server certificates on the application gateway listener. In application gateway to backend pool connections, the cipher suites used are based on the type of server certificates on the backend pool servers.
94+
> TLS cipher suites used for the connection are also based on the type of the certificate being used. In client to application gateway connections, the cipher suites used are based on the type of server certificates on the application gateway listener. In application gateway to backend pool connections, the cipher suites used are based on the type of server certificates on the backend pool servers.
9595
9696
## Known issue
9797
Application Gateway v2 does not currently support the following ciphers:
@@ -106,4 +106,4 @@ Application Gateway v2 does not currently support the following ciphers:
106106

107107
## Next steps
108108

109-
If you want to learn to configure an SSL policy, see [Configure SSL policy on an application gateway](application-gateway-configure-ssl-policy-powershell.md).
109+
If you want to learn to configure a TLS policy, see [Configure TLS policy versions and cipher suites on Application Gateway](application-gateway-configure-ssl-policy-powershell.md).

0 commit comments

Comments
 (0)